17 February 2020 Nearly a year ago I reached out to my high school across the state about coming in and giving a talk about careers in tech. Due to conflicting schedules I had to reschedule a few times and after a few crazy months of travel to end my 2019, I finally got the […]

“If you cannot get rid of the family skeleton, you may as well make it dance.” – George Bernard Shaw Calgary, the historical heart of the Canadian oil & gas industry, is at a once-in-an-epoch inflection point that will determine our destiny for this next millennium and beyond. Energy sources and technologies that have powered […]

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2012-1093PUBLISHED: 2020-02-21 The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation. CVE-2012-0828PUBLISHED: 2020-02-21 Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause […]

The data scientist role emerged as a sought-after position during the 2010s. Demand for data scientists is continuing to grow. Mr. Khaled Hasna, a technical recruiter with IT-IQ Inc. observes, “significant growth in demand for data science in the finance and insurance sectors – anywhere where risk assessment is required.” The numbers back this up. […]

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed. A Feb. 11 ransomware attack targeting NRC Health has driven concerns about the security of patient data stored on the organization’s servers. NRC Health manages patient survey systems and works with 75% of the 200 largest hospital chains […]

It’s frustrating when your website isn’t succeeding in fulfilling its objective. At times, it can be unclear what the bottleneck is. I’ve concluded that having a fresh pair of eyes to go through your design and using web metrics are the best ways to pinpoint weak spots that hold back a website’s potential. Here are […]

What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. Chances are that the very word ‘Linux’ conjures up images of near-impenetrable security. However, Linux-based computer systems and applications running on them increasingly […]

About The Author Alfrick Opidi is an experienced web developer with a passion in exploring how emerging technologies can be utilized to create performant, productive, and … More about Alfrick … This tutorial demonstrates how to create a simple cryptocurrency, called smashingCoin, using the concepts of JavaScript classes and Node.js. Give it a try — […]